I have updated the blog post in https://github.com/apache/pulsar/pull/13274/files
*If upgrading is not an option, you may also mitigate by adding `-Dlog4j2.formatMsgNoLookups=true` to the `PUSLAR_EXTRA_OPTS` in the `configData` section for proxy, broker, bookkeeper, zookeeper, auto-recovery, and relative components in the helm values file.* On Mon, Dec 13, 2021 at 11:38 AM Dave Fisher <w...@apache.org> wrote: > Please see the blog post @ https://pulsar.apache.org/blog/ > > December 11, 2021 > > Matteo Merli > <> > Yesterday, a new serious vulnerability was reported regarding Log4j that > can allow remote execution for attackers. > > The vulnerability issue is described and tracked under CVE-2021-44228 < > https://nvd.nist.gov/vuln/detail/CVE-2021-44228>. > > Current releases of Apache Pulsar are bundling Log4j2 versions that are > affected by this vulnerability. We strongly recommend to follow the > advisory of the Apache Log4j community and patch your systems as soon as > possible. > > There are 2 workarounds to patch a Pulsar deployments. You can set either > of: > > Java property: -Dlog4j2.formatMsgNoLookups=true > Environment variable: LOG4J_FORMAT_MSG_NO_LOOKUPS=true > Both approaches are effective in mitigating the vulnerability for Pulsar > services. > > Additionally, when running Pulsar Functions with Kubernetes runtime, you > should update your Docker images, following the example described here < > https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228>. > > If you are using the Pulsar Helm Chart for deploying in Kubernetes, a new > version of the chart < > https://github.com/apache/pulsar-helm-chart/releases/tag/pulsar-2.7.6> is > already available and it applies the above mentioned workaround. > > We are already preparing new patch releases, 2.7.4, 2.8.2 and 2.9.1. These > releases will be ready in the next few days and will bundle the Log4j2 > 2.15.0, which contains the vulnerability fix.